pietro.delsante's bloghttp://www.honeynet.org/blog/364
To learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.enIn-depth Interview: Lukas Risthttp://www.honeynet.org/node/1153
<p>Lukas Rist (<a href="https://twitter.com/glaslos">@glaslos</a>) is a software engineer with Blue Coat Norway where he develops behavioral malware analysis systems. In his spare time, he creates web application and ICS/SCADA honeypots and botnet monitoring tools under the umbrella of the Honeynet Project. He recently developed an interest in industrial security and automated SQL statement classification. He will be giving <a href="http://warsaw2014.honeynet.org/briefings.html#demo2">a live demo on Conpot</a> at the upcoming <a href="http://warsaw2014.honeynet.org/">The Honeynet Project workshop in Warsaw</a>, on May 13. Here are his answers to our questions: keep reading to get to know a bit more about him.</p>
<p><a href="http://www.honeynet.org/node/1153" target="_blank">read more</a></p>Fri, 18 Apr 2014 22:35:46 +0000pietro.delsante1153 at http://www.honeynet.orgIn-depth Interview: Maximilian Hilshttp://www.honeynet.org/node/1152
<p>Maximilian Hils (<a href="https://twitter.com/maximilianhils">@maximilianhils</a>) is a student of Information Systems at WWU Münster, Germany. He is one of the two core developers of mitmproxy, on which he started to work on during his Honeynet Google Summer of Code project in 2012. In his spare time, he develops web applications and slays SSL dragons whereever he finds them. Recently, he developed an interest in Cloud Storage Security and Security Usability. He will be giving a live demo about "<a href="http://warsaw2014.honeynet.org/briefings.html#demo5">slaying SSL dragons with mitmproxy</a>" at the upcoming annual <a href="http://warsaw2014.honeynet.org/">The Honeynet Project workshop in Warsaw</a> on May 13. Here you have a nice way to discover something more about him and his work.</p>
<p><a href="http://www.honeynet.org/node/1152" target="_blank">read more</a></p>Fri, 18 Apr 2014 22:25:47 +0000pietro.delsante1152 at http://www.honeynet.orgIn-depth Interview: Sebastian Pöplauhttp://www.honeynet.org/node/1151
<p>Sebastian Pöplau (<a href="https://twitter.com/poeplau">@poeplau</a>) is the lead developer of the Ghost USB Honeypot, a detection system for USB malware. He is an IT security enthusiast and a full member of the Honeynet Project. He has studied in Bonn, Germany, and Santa Barbara, CA, and works with Lastline. He will be giving a live demo about <a href="http://warsaw2014.honeynet.org/briefings.html#demo3">code-loading techniques on Android</a> during the annual <a href="http://warsaw2014.honeynet.org/">The Honeynet Project Workshop in Warsaw</a> on May 12. Here you have a good chance to get to know him a bit more.</p>
<p><a href="http://www.honeynet.org/node/1151" target="_blank">read more</a></p>Fri, 18 Apr 2014 22:14:45 +0000pietro.delsante1151 at http://www.honeynet.orgMalware-serving theaters for your android phones - Part 1http://www.honeynet.org/node/1080
<p>Some nights ago I was heading to a local theater with some (non-nerd) friends. We did not recall very well the address, so I brought out my phone (LG Nexus 4 with Android 4.4.2 and Google Chrome) and googled for it. I found the theater's official site and started looking for the contact info, when Chrome suddenly opened a popup window pointing me to a Russian web site (<em>novostivkontakte.ru</em>) urging me to update my Flash Player. I laughed loudly and showed them to my (again, totally non-nerd) friends saying that the site had been owned. One of them went on and opened the site with her own phone (Samsung Galaxy S Advance with Android 4.4.1 and the default Android WebKit browser). To make a long story short, after a few instants her phone was downloading a file without even asking her for confirmation. So: Chrome on my Nexus 4 was using social engineering to have me click on a link and manually download the file; Android's WebKit on her Galaxy S Advance was instead downloading the file straight away: interesting! However, we were a bit late and we had to run for the comedy, so I did not even bother to see what the heck she had downloaded, I only made sure she hadn't opened it. I thought it was just the usual exploit kit trying to infect PCs by serving fake Flash Player updates, seen tons of those. While waiting for the comedy to begin, I quickly submitted the compromised site to three different services, the first three ones that came to my mind: HoneyProxy Client, Wepawet and Unmask Parasites, then turned off my phone and enjoyed the show.</p>
<p><a href="http://www.honeynet.org/node/1080" target="_blank">read more</a></p>androidAPKexploitmalwarethugSysenter ChapterTue, 07 Jan 2014 21:52:00 +0000pietro.delsante1080 at http://www.honeynet.org